QUESTION 101
Which two statements about transparent bridging operations are true? (Choose two.)

A. A bridge builds its MAC address table dynamically using the spanning-tree protocol.
B. A bridge operates at the data link layer.
C. A bridge sends unknown unicast frames out on all ports except the incoming port.
D. A bridge forwards traffic based on the destination IP address.
E. All the ports on the bridge belong to the same collision domain.

A. MD5 authentication can only be established between Internal BGP peers.
B. Authentication can be established using keychains on one peer and MD5 hashing on the other.
C. UDP port 179 is used for BGP session authentication.
D. MD5 passwords are never sent to a peer.
E. Routers authenticate each routing update packet received.
F. BGP peers can be configured with different passwords.

Answer: DE

QUESTION 103
Which two statements about classful or classless routing protocol operations are true? (Choose two.)

QUESTION 107
Refer to the exhibit. Host 3 on Network A is sending data to Host 8 on Network B. Which address is the default gateway of Host 3?

A. The address of the switch interface that is connected to router interface Fa0/0
B. The address of the switch interface that is connected to router interface Fa0/1
C. The address of the host that is connected to Network A
D. The address of the host that is connected to Network B
E. The address of the router interface Fa0/0
F. The address of the router interface Fa0/1

Answer: E

QUESTION 108
The PE and CE interfaces are in the UP/UP state. The junior Network Engineer has validated Layer 3 functionality by pinging the adjacent interface, however the customer is unable to access the provider network. What should be your next troubleshooting step?

A. Validate that the encapsulation method is utilizing Point-to-Point Protocol
B. Validate that the destination customer network is in the correct VRF
C. Validate that the circuit clocking is inaccurate and needs to be synchronized on both sides
D. Check the physical connection between both devices to ensure stability
E. Identify incorrect RADIUS configuration is present on the PE device
F. Check that an access-list is mis-configured on the loopback 0 interface and needs to be corrected

Answer: B

QUESTION 109
What are two differences between WAN and LAN? (Choose two.)

A. The customer has explicit control of their own WAN.
B. The customer can modify the service provider route distinguishers.
C. The customer has explicit control of their LAN.
D. The customer is aware of the infrastructure within the WAN.
E. WANs will differ from LANs with attributes such as latency and distance.

Answer: CE

QUESTION 110
Which of the following correctly pairs the dotted decimal subnet mask with the correct number of binary bits that represent the subnet mask?